diff options
Diffstat (limited to 'plugins/docsis/packet-bpkmattr.c')
-rw-r--r-- | plugins/docsis/packet-bpkmattr.c | 574 |
1 files changed, 0 insertions, 574 deletions
diff --git a/plugins/docsis/packet-bpkmattr.c b/plugins/docsis/packet-bpkmattr.c deleted file mode 100644 index 1fc3183bfa..0000000000 --- a/plugins/docsis/packet-bpkmattr.c +++ /dev/null @@ -1,574 +0,0 @@ -/* packet-bpkmattr.c - * Routines for Baseline Privacy Key Management Attributes dissection - * Copyright 2017, Adrian Simionov <daniel.simionov@gmail.com> - * Copyright 2002, Anand V. Narwani <anand[AT]narwani.org> - * - * Wireshark - Network traffic analyzer - * By Gerald Combs <gerald@wireshark.org> - * Copyright 1998 Gerald Combs - * - * This program is free software; you can redistribute it and/or - * modify it under the terms of the GNU General Public License - * as published by the Free Software Foundation; either version 2 - * of the License, or (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. - */ - -#include "config.h" - -#include <epan/packet.h> -#include <epan/expert.h> - -/* BPKM Attributes defined in: - * http://www.cablemodem.com/downloads/specs/SP-BPI+_I10-030730.pdf - */ -#define BPKM_RESERVED 0 -#define BPKM_SERIAL_NUM 1 -#define BPKM_MANUFACTURER_ID 2 -#define BPKM_MAC_ADDR 3 -#define BPKM_RSA_PUB_KEY 4 -#define BPKM_CM_ID 5 -#define BPKM_DISPLAY_STR 6 -#define BPKM_AUTH_KEY 7 -#define BPKM_TEK 8 -#define BPKM_KEY_LIFETIME 9 -#define BPKM_KEY_SEQ_NUM 10 -#define BPKM_HMAC_DIGEST 11 -#define BPKM_SAID 12 -#define BPKM_TEK_PARAM 13 -#define BPKM_OBSOLETED 14 -#define BPKM_CBC_IV 15 -#define BPKM_ERROR_CODE 16 -#define BPKM_CA_CERT 17 -#define BPKM_CM_CERT 18 -#define BPKM_SEC_CAPABILITIES 19 -#define BPKM_CRYPTO_SUITE 20 -#define BPKM_CRYPTO_SUITE_LIST 21 -#define BPKM_BPI_VERSION 22 -#define BPKM_SA_DESCRIPTOR 23 -#define BPKM_SA_TYPE 24 -#define BPKM_SA_QUERY 25 -#define BPKM_SA_QUERY_TYPE 26 -#define BPKM_IP_ADDRESS 27 -#define BPKM_DNLD_PARAMS 28 -#define BPKM_VENDOR_DEFINED 127 - -void proto_register_docsis_bpkmattr(void); -void proto_reg_handoff_docsis_bpkmattr(void); - -/* Initialize the protocol and registered fields */ -static int proto_docsis_bpkmattr = -1; -static int hf_docsis_bpkmattr_serial_num = -1; -static int hf_docsis_bpkmattr_manf_id = -1; -static int hf_docsis_bpkmattr_mac_addr = -1; -static int hf_docsis_bpkmattr_rsa_pub_key = -1; -/* static int hf_docsis_bpkmattr_cm_id = -1; */ -static int hf_docsis_bpkmattr_display_str = -1; -static int hf_docsis_bpkmattr_auth_key = -1; -static int hf_docsis_bpkmattr_tek = -1; -static int hf_docsis_bpkmattr_key_life = -1; -static int hf_docsis_bpkmattr_key_seq = -1; -static int hf_docsis_bpkmattr_hmac_digest = -1; -static int hf_docsis_bpkmattr_said = -1; -/* static int hf_docsis_bpkmattr_tek_params = -1; */ -static int hf_docsis_bpkmattr_cbc_iv = -1; -static int hf_docsis_bpkmattr_error_code = -1; -static int hf_docsis_bpkmattr_vendor_def = -1; -static int hf_docsis_bpkmattr_ca_cert = -1; -static int hf_docsis_bpkmattr_cm_cert = -1; -/* static int hf_docsis_bpkmattr_security_cap = -1; */ -static int hf_docsis_bpkmattr_crypto_suite = -1; -static int hf_docsis_bpkmattr_crypto_suite_list = -1; -static int hf_docsis_bpkmattr_bpi_version = -1; -/* static int hf_docsis_bpkmattr_sa_descr = -1; */ -static int hf_docsis_bpkmattr_sa_type = -1; -/* static int hf_docsis_bpkmattr_sa_query = -1; */ -static int hf_docsis_bpkmattr_sa_query_type = -1; -static int hf_docsis_bpkmattr_ip_address = -1; -/* static int hf_docsis_bpkmattr_download_param = -1; */ - -/* Initialize the subtree pointers */ -static gint ett_docsis_bpkmattr = -1; -static gint ett_docsis_bpkmattr_cmid = -1; -static gint ett_docsis_bpkmattr_scap = -1; -static gint ett_docsis_bpkmattr_tekp = -1; -static gint ett_docsis_bpkmattr_sadsc = -1; -static gint ett_docsis_bpkmattr_saqry = -1; -static gint ett_docsis_bpkmattr_dnld = -1; - -static expert_field ei_docsis_bpkmattr_tlvlen_bad = EI_INIT; - -static const value_string error_code_vals[] = { - {0, "No Information"}, - {1, "Unauthorized CM"}, - {2, "Unauthorized SAID"}, - {3, "Unsolicited"}, - {4, "Invalid Key Sequence Number"}, - {5, "Message (Key Request) authentication failure"}, - {6, "Permanent Authorization Failure"}, - {7, "Not authorized for requested downstream traffic flow"}, - {8, "Downstream traffic flow not mapped to SAID"}, - {9, "Time of day not acquired"}, - {10, "EAE Disabled"}, - {0, NULL}, -}; - -static const value_string crypto_suite_attr_vals[] = { - {0x0100, "CBC-Mode 56-bit DES, no data authentication"}, - {0x0200, "CBC-Mode 40-bit DES, no data authentication"}, - {0x0300, "CBC-Mode 128-bit AES, no data authentication"}, - {0, NULL}, -}; - -static const value_string bpi_ver_vals[] = { - {0, "Reserved"}, - {1, "BPI+"}, - {0, NULL}, -}; - -/* The dissect_attrs() function does the actual work to dissect the - * attributes. It's called recursively, to dissect embedded attributes - */ -static void -dissect_attrs (tvbuff_t * tvb, packet_info * pinfo, proto_tree * tree, proto_item* item) -{ - guint8 type; - guint16 length; - int pos = 0; - gint total_len; - proto_tree *cmid_tree, *tekp_tree, *scap_tree; - proto_tree *saqry_tree, *dnld_tree, *sadsc_tree; - proto_item *ti; - tvbuff_t *cmid_tvb, *tekp_tvb, *scap_tvb; - tvbuff_t *saqry_tvb, *dnld_tvb, *sadsc_tvb; - - total_len = tvb_reported_length_remaining (tvb, 0); - while (pos < total_len) - { - type = tvb_get_guint8 (tvb, pos++); - length = tvb_get_ntohs (tvb, pos); - pos += 2; - switch (type) - { - case BPKM_RESERVED: - break; - case BPKM_SERIAL_NUM: - proto_tree_add_item (tree, hf_docsis_bpkmattr_serial_num, tvb, pos, - length, ENC_ASCII|ENC_NA); - break; - case BPKM_MANUFACTURER_ID: - if (length == 3) - proto_tree_add_item (tree, hf_docsis_bpkmattr_manf_id, tvb, pos, - length, ENC_NA); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_MAC_ADDR: - if (length == 6) - proto_tree_add_item (tree, hf_docsis_bpkmattr_mac_addr, tvb, pos, - length, ENC_NA); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_RSA_PUB_KEY: - proto_tree_add_item (tree, hf_docsis_bpkmattr_rsa_pub_key, tvb, pos, - length, ENC_NA); - break; - case BPKM_CM_ID: - cmid_tree = - proto_tree_add_subtree(tree, tvb, pos, length, - ett_docsis_bpkmattr_cmid, &ti, "5 CM Identification"); - cmid_tvb = tvb_new_subset_length (tvb, pos, length); - dissect_attrs (cmid_tvb, pinfo, cmid_tree, ti); - break; - case BPKM_DISPLAY_STR: - proto_tree_add_item (tree, hf_docsis_bpkmattr_display_str, tvb, pos, - length, ENC_ASCII|ENC_NA); - break; - case BPKM_AUTH_KEY: - if ((length == 96) || (length == 128) || (length == 256)) - proto_tree_add_item (tree, hf_docsis_bpkmattr_auth_key, tvb, pos, - length, ENC_NA); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_TEK: - if (length == 8 || length == 16) - proto_tree_add_item (tree, hf_docsis_bpkmattr_tek, tvb, pos, - length, ENC_NA); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_KEY_LIFETIME: - if (length == 4) - proto_tree_add_item (tree, hf_docsis_bpkmattr_key_life, tvb, pos, - length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_KEY_SEQ_NUM: - if (length == 1) - proto_tree_add_item (tree, hf_docsis_bpkmattr_key_seq, tvb, pos, - length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_HMAC_DIGEST: - if (length == 20) - proto_tree_add_item (tree, hf_docsis_bpkmattr_hmac_digest, tvb, - pos, length, ENC_NA); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_SAID: - if (length == 2) - proto_tree_add_item (tree, hf_docsis_bpkmattr_said, tvb, pos, - length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_TEK_PARAM: - tekp_tree = - proto_tree_add_subtree(tree, tvb, pos, length, ett_docsis_bpkmattr_tekp, &ti, "13 TEK Parameters"); - tekp_tvb = tvb_new_subset_length (tvb, pos, length); - dissect_attrs (tekp_tvb, pinfo, tekp_tree, ti); - break; - case BPKM_OBSOLETED: - break; - case BPKM_CBC_IV: - if (length == 8 || length == 16) - proto_tree_add_item (tree, hf_docsis_bpkmattr_cbc_iv, tvb, pos, - length, ENC_NA); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_ERROR_CODE: - if (length == 1) - proto_tree_add_item (tree, hf_docsis_bpkmattr_error_code, tvb, - pos, length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_CA_CERT: - proto_tree_add_item (tree, hf_docsis_bpkmattr_ca_cert, tvb, pos, - length, ENC_NA); - break; - case BPKM_CM_CERT: - proto_tree_add_item (tree, hf_docsis_bpkmattr_cm_cert, tvb, pos, - length, ENC_NA); - break; - case BPKM_SEC_CAPABILITIES: - scap_tree = - proto_tree_add_subtree(tree, tvb, pos, length, - ett_docsis_bpkmattr_scap, &ti, "19 Security Capabilities"); - scap_tvb = tvb_new_subset_length (tvb, pos, length); - dissect_attrs (scap_tvb, pinfo, scap_tree, ti); - break; - case BPKM_CRYPTO_SUITE: - if (length == 2) - proto_tree_add_item (tree, hf_docsis_bpkmattr_crypto_suite, tvb, - pos, length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_CRYPTO_SUITE_LIST: - proto_tree_add_item (tree, hf_docsis_bpkmattr_crypto_suite_list, - tvb, pos, length, ENC_NA); - break; - case BPKM_BPI_VERSION: - if (length == 1) - proto_tree_add_item (tree, hf_docsis_bpkmattr_bpi_version, tvb, - pos, length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_SA_DESCRIPTOR: - sadsc_tree = - proto_tree_add_subtree(tree, tvb, pos, length, ett_docsis_bpkmattr_sadsc, &ti, "23 SA Descriptor"); - sadsc_tvb = tvb_new_subset_length (tvb, pos, length); - dissect_attrs (sadsc_tvb, pinfo, sadsc_tree, ti); - break; - case BPKM_SA_TYPE: - if (length == 1) - proto_tree_add_item (tree, hf_docsis_bpkmattr_sa_type, tvb, pos, - length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_SA_QUERY: - saqry_tree = - proto_tree_add_subtree(tree, tvb, pos, length, ett_docsis_bpkmattr_saqry, &ti, "25 SA Query"); - saqry_tvb = tvb_new_subset_length (tvb, pos, length); - dissect_attrs (saqry_tvb, pinfo, saqry_tree, ti); - break; - case BPKM_SA_QUERY_TYPE: - if (length == 1) - proto_tree_add_item (tree, hf_docsis_bpkmattr_sa_query_type, tvb, - pos, length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_IP_ADDRESS: - if (length == 4) - proto_tree_add_item (tree, hf_docsis_bpkmattr_ip_address, tvb, - pos, length, ENC_BIG_ENDIAN); - else - expert_add_info_format(pinfo, item, &ei_docsis_bpkmattr_tlvlen_bad, "Wrong TLV length: %u", length); - break; - case BPKM_VENDOR_DEFINED: - proto_tree_add_item (tree, hf_docsis_bpkmattr_vendor_def, tvb, pos, - length, ENC_NA); - break; - case BPKM_DNLD_PARAMS: - dnld_tree = - proto_tree_add_subtree(tree, tvb, pos, length, - ett_docsis_bpkmattr_dnld, &ti, "28 Download Parameters"); - dnld_tvb = tvb_new_subset_length (tvb, pos, length); - dissect_attrs (dnld_tvb, pinfo, dnld_tree, ti); - break; - default: - proto_tree_add_item (tree, hf_docsis_bpkmattr_vendor_def, tvb, pos, - length, ENC_NA); - break; - } - pos += length; /* switch */ - } /* while */ -} - -static int -dissect_bpkmattr (tvbuff_t * tvb, packet_info * pinfo, proto_tree * tree, void* data _U_) -{ - - proto_item *it; - proto_tree *bpkmattr_tree; - - it = proto_tree_add_protocol_format (tree, proto_docsis_bpkmattr, tvb, 0, -1, - "BPKM Attributes"); - bpkmattr_tree = proto_item_add_subtree (it, ett_docsis_bpkmattr); - dissect_attrs (tvb, pinfo, bpkmattr_tree, it); - - return tvb_captured_length(tvb); -} - -/* Register the protocol with Wireshark */ -void -proto_register_docsis_bpkmattr (void) -{ - static hf_register_info hf[] = { - {&hf_docsis_bpkmattr_serial_num, - {"1 Serial Number", "docsis_bpkmattr.serialnum", - FT_STRING, BASE_NONE, NULL, 0x0, - "Serial Number", HFILL} - }, - {&hf_docsis_bpkmattr_manf_id, - {"2 Manufacturer Id", "docsis_bpkmattr.manfid", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Manufacturer Id", HFILL} - }, - {&hf_docsis_bpkmattr_mac_addr, - {"3 Mac Address", "docsis_bpkmattr.macaddr", - FT_ETHER, BASE_NONE, NULL, 0x0, - "Mac Address", HFILL} - }, - {&hf_docsis_bpkmattr_rsa_pub_key, - {"4 RSA Public Key", "docsis_bpkmattr.rsa_pub_key", - FT_BYTES, BASE_NONE, NULL, 0x0, - "RSA Public Key", HFILL} - }, -#if 0 - {&hf_docsis_bpkmattr_cm_id, - {"5 CM Identification", "docsis_bpkmattr.cmid", - FT_BYTES, BASE_NONE, NULL, 0x0, - "CM Identification", HFILL} - }, -#endif - {&hf_docsis_bpkmattr_display_str, - {"6 Display String", "docsis_bpkmattr.dispstr", - FT_STRING, BASE_NONE, NULL, 0x0, - "Display String", HFILL} - }, - {&hf_docsis_bpkmattr_auth_key, - {"7 Auth Key", "docsis_bpkmattr.auth_key", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Auth Key", HFILL} - }, - {&hf_docsis_bpkmattr_tek, - {"8 Traffic Encryption Key", "docsis_bpkmattr.tek", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Traffic Encryption Key", HFILL} - }, - {&hf_docsis_bpkmattr_key_life, - {"9 Key Lifetime (s)", "docsis_bpkmattr.keylife", - FT_UINT32, BASE_DEC, NULL, 0x0, - "Key Lifetime (s)", HFILL} - }, - {&hf_docsis_bpkmattr_key_seq, - {"10 Key Sequence Number", "docsis_bpkmattr.keyseq", - FT_UINT8, BASE_DEC, NULL, 0x0, - "Key Sequence Number", HFILL} - }, - {&hf_docsis_bpkmattr_hmac_digest, - {"11 HMAC Digest", "docsis_bpkmattr.hmacdigest", - FT_BYTES, BASE_NONE, NULL, 0x0, - "HMAC Digest", HFILL} - }, - {&hf_docsis_bpkmattr_said, - {"12 SAID", "docsis_bpkmattr.said", - FT_UINT16, BASE_DEC, NULL, 0x0, - "Security Association ID", HFILL} - }, -#if 0 - {&hf_docsis_bpkmattr_tek_params, - {"13 TEK Parameters", "docsis_bpkmattr.tekparams", - FT_BYTES, BASE_NONE, NULL, 0x0, - "TEK Parameters", HFILL} - }, -#endif - {&hf_docsis_bpkmattr_cbc_iv, - {"15 CBC IV", "docsis_bpkmattr.cbciv", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Cypher Block Chaining", HFILL} - }, - {&hf_docsis_bpkmattr_error_code, - {"16 Error Code", "docsis_bpkmattr.errcode", - FT_UINT8, BASE_DEC, VALS (error_code_vals), 0x0, - "Error Code", HFILL} - }, - {&hf_docsis_bpkmattr_vendor_def, - {"127 Vendor Defined", "docsis_bpkmattr.vendordef", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Vendor Defined", HFILL} - }, - {&hf_docsis_bpkmattr_ca_cert, - {"17 CA Certificate", "docsis_bpkmattr.cacert", - FT_BYTES, BASE_NONE, NULL, 0x0, - "CA Certificate", HFILL} - }, - {&hf_docsis_bpkmattr_cm_cert, - {"18 CM Certificate", "docsis_bpkmattr.cmcert", - FT_BYTES, BASE_NONE, NULL, 0x0, - "CM Certificate", HFILL} - }, -#if 0 - {&hf_docsis_bpkmattr_security_cap, - {"19 Security Capabilities", "docsis_bpkmattr.seccap", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Security Capabilities", HFILL} - }, -#endif - {&hf_docsis_bpkmattr_crypto_suite, - {"20 Cryptographic Suite", "docsis_bpkmattr.cryptosuite", - FT_UINT16, BASE_HEX, VALS(crypto_suite_attr_vals), 0x0, - "Cryptographic Suite", HFILL} - }, - {&hf_docsis_bpkmattr_crypto_suite_list, - {"21 Cryptographic Suite List", "docsis_bpkmattr.crypto_suite_lst", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Cryptographic Suite", HFILL} - }, - {&hf_docsis_bpkmattr_bpi_version, - {"22 BPI Version", "docsis_bpkmattr.bpiver", - FT_UINT8, BASE_DEC, VALS (bpi_ver_vals), 0x0, - "BPKM Attributes", HFILL} - }, -#if 0 - {&hf_docsis_bpkmattr_sa_descr, - {"23 SA Descriptor", "docsis_bpkmattr.sadescr", - FT_BYTES, BASE_NONE, NULL, 0x0, - "SA Descriptor", HFILL} - }, -#endif - {&hf_docsis_bpkmattr_sa_type, - {"24 SA Type", "docsis_bpkmattr.satype", - FT_UINT8, BASE_DEC, NULL, 0x0, - "SA Type", HFILL} - }, -#if 0 - {&hf_docsis_bpkmattr_sa_query, - {"25 SA Query", "docsis_bpkmattr.saquery", - FT_BYTES, BASE_NONE, NULL, 0x0, - "SA Query", HFILL} - }, -#endif - {&hf_docsis_bpkmattr_sa_query_type, - {"26 SA Query Type", "docsis_bpkmattr.saquery_type", - FT_UINT8, BASE_HEX, NULL, 0x0, - "SA Query Type", HFILL} - }, - {&hf_docsis_bpkmattr_ip_address, - {"27 IP Address", "docsis_bpkmattr.ipaddr", - FT_IPv4, BASE_NONE, NULL, 0x0, - "IP Address", HFILL} - }, -#if 0 - {&hf_docsis_bpkmattr_download_param, - {"28 Download Parameters", "docsis_bpkmattr.dnld_params", - FT_BYTES, BASE_NONE, NULL, 0x0, - "Download Parameters", HFILL} - }, -#endif - }; - - static gint *ett[] = { - &ett_docsis_bpkmattr, - &ett_docsis_bpkmattr_cmid, - &ett_docsis_bpkmattr_scap, - &ett_docsis_bpkmattr_tekp, - &ett_docsis_bpkmattr_sadsc, - &ett_docsis_bpkmattr_saqry, - &ett_docsis_bpkmattr_dnld - }; - - static ei_register_info ei[] = { - {&ei_docsis_bpkmattr_tlvlen_bad, { "docsis_bpkmattr.tlvlenbad", PI_MALFORMED, PI_ERROR, "Bad TLV length", EXPFILL}}, - }; - - expert_module_t* expert_docsis_bpkmattr; - - proto_docsis_bpkmattr = - proto_register_protocol - ("DOCSIS Baseline Privacy Key Management Attributes", "DOCSIS BPKM-ATTR", - "docsis_bpkmattr"); - - proto_register_field_array (proto_docsis_bpkmattr, hf, array_length (hf)); - proto_register_subtree_array (ett, array_length (ett)); - expert_docsis_bpkmattr = expert_register_protocol(proto_docsis_bpkmattr); - expert_register_field_array(expert_docsis_bpkmattr, ei, array_length(ei)); - - register_dissector ("docsis_bpkmattr", dissect_bpkmattr, - proto_docsis_bpkmattr); -} - - -void -proto_reg_handoff_docsis_bpkmattr (void) -{ -#if 0 - dissector_handle_t docsis_bpkmattr_handle; - - docsis_bpkmattr_handle = find_dissector ("docsis_bpkmattr"); - dissector_add_uint ("docsis", 0xFE, docsis_bpkmattr_handle); -#endif - -} - -/* - * Editor modelines - http://www.wireshark.org/tools/modelines.html - * - * Local Variables: - * c-basic-offset: 2 - * tab-width: 8 - * indent-tabs-mode: nil - * End: - * - * ex: set shiftwidth=2 tabstop=8 expandtab: - * :indentSize=2:tabSize=8:noTabs=true: - */ |